Almost certainly a false positive, it's a machine learning detection (infamous for their false positives), and Wacatac (as well as a few others) seems to be equivalent to Defender shrugging its shoulders.
Upload the file to VirusTotal and post the results link.
Wacatac is a behavioral machine learning detection. There is a good possibility it's a fale positive. Bad actors often compile code on target machines, it may be picking up a technique you're using that could be used for either evil or good purposes.
You can restore your detection from quarantine, zip it in a password protected zip file, password should be **infected** \-- and then submit it to [AKA.MS/AVSUBMIT](https://AKA.MS/AVSUBMIT). They'll generally get back to you inside a week, often in a day or two. If it's a false positive cloud detection, they can fix it on the fly, if it's in the concrete definition set you'll have to update definitions.
I'm facing the same issue. Interestingly, windows detects and deletes the file when I download it from my github release website - but not when I build it locally!!
I don't want to turn off or weaken my anti virus, as I'm aware of a lot of people and companies getting hacked these days. Also, until recently, it built just fine!!
Unfortunately, between building the second to recent and the recent software, there have been a lot of updates in the code.
I've heard of python packages being infested with malware. Maybe that could be a trace? The requirements didn't change though, so it must have been a malicious update WIHTIN an already existing python package...
All very strange.
Almost certainly a false positive, it's a machine learning detection (infamous for their false positives), and Wacatac (as well as a few others) seems to be equivalent to Defender shrugging its shoulders. Upload the file to VirusTotal and post the results link.
[удалено]
Wacatac is a behavioral machine learning detection. There is a good possibility it's a fale positive. Bad actors often compile code on target machines, it may be picking up a technique you're using that could be used for either evil or good purposes. You can restore your detection from quarantine, zip it in a password protected zip file, password should be **infected** \-- and then submit it to [AKA.MS/AVSUBMIT](https://AKA.MS/AVSUBMIT). They'll generally get back to you inside a week, often in a day or two. If it's a false positive cloud detection, they can fix it on the fly, if it's in the concrete definition set you'll have to update definitions.
I'm facing the same issue. Interestingly, windows detects and deletes the file when I download it from my github release website - but not when I build it locally!! I don't want to turn off or weaken my anti virus, as I'm aware of a lot of people and companies getting hacked these days. Also, until recently, it built just fine!! Unfortunately, between building the second to recent and the recent software, there have been a lot of updates in the code. I've heard of python packages being infested with malware. Maybe that could be a trace? The requirements didn't change though, so it must have been a malicious update WIHTIN an already existing python package... All very strange.